Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vwh5-q72r-gr35

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0), SCALANCE S612 (All versions >= V3.0), SCALANCE S623 (All versions >= V3.0), SCALANCE S627-2M (All versions >= V3.0). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device.

A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0), SCALANCE S612 (All versions >= V3.0), SCALANCE S623 (All versions >= V3.0), SCALANCE S627-2M (All versions >= V3.0). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device.

EPSS

Процентиль: 54%
0.00316
Низкий

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 7.5
nvd
почти 6 лет назад

A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device.

CVSS3: 7.5
fstec
почти 6 лет назад

Уязвимость микропрограммного обеспечения межсетевого экрана Siemens SCALANCE S, связанная с неконтролируемым расходом ресурса (Истощение), позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 54%
0.00316
Низкий

Дефекты

CWE-400